Associate, Vulnerability Management at Santander US
Quincy, Massachusetts, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Sep, 25

Salary

80625.0

Posted On

05 Jun, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Iec, Cmdb, Ownership, Assessment, Iso, Cyber Security, Program Management, It Infrastructure, Threat Intelligence

Industry

Information Technology/IT

Description

EMPLOYER RIGHTS:

This job description does not list all of the job duties of the job. You may be asked by your supervisors or managers to perform other duties. You may be evaluated in part based upon your performance of the tasks listed in this job description. The employer has the right to revise this job description at any time. This job description is not a contract for employment and either you or the employer may terminate your employment at any time for any reason.
What To Do Next:
Review the internal eligibility guidelines here. If this sounds like a role you are interested in, then please apply.
We are committed to providing an inclusive and accessible application process for all candidates. If you require any assistance or accommodation due to a disability or any other reason, please contact us at TAOps@santander.us to discuss your needs.

Responsibilities
  • Conducts Penetration Testing (e.g., internal, external, wireless, physical, social, etc.); Post vulnerability assessment, work with various stakeholders to provide remediation to the identified risks and bring the same to closure.
  • Conducts walk-through of the assessment report to the stakeholders and help define remediation plan.
  • Follows a standard methodology to identify and/or detect threats to the IT infrastructure, applications and other information assets.
  • Works with various teams to follow a pre-assessment plan/ and assessment schedule for every assessment, conduct threat assessment, and deliver an assessment report.
  • Performs technical security assessments (e.g., Windows, UNIX, firewalls, routers, oracle, SQL server, etc.).
  • Performs web application security assessments (e.g., exploiting web app vulnerabilities such as SQL injection, cross-site scripting, parameter manipulation, session hijacking, etc.
  • Conducts vulnerability assessment on the target IT Infrastructure, applications and related information assets.
  • Directs managers and a senior technical team to deliver security change in a global organization
  • Provides direction and act as an escalation point on projects and issues to other team members
  • Interacts with partners as needed to explain work product, security techniques, methodology and results to ensure appropriate business value
  • Acts as senior resource for incident response related activities. Collaborate with technical teams for security incident remediation and communication.
  • Acts as influencer of peers and management.
  • Oversees management and deployment of security infrastructure including Vulnerability Management, WAF, Network Monitoring, Logging correlation, DDOS prevention and IPS/IDS.
  • Provides technical security consulting support to address complex business and technology projects and requests.
  • Contributes to strategic planning to evaluate, deploy or update security technologies.
  • Analyzes and implements security solutions to meet customer requirements.
  • Conducts risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications and systems.
  • Promotes cross-department collaboration and communication to ensure appropriate processes, procedures and tools are installed, monitored, and effectively operating and alerting
  • Allocates and prioritizes security resources efficiently within the organization managing both resources and budgets
  • Conducts security research on threats and remediation methods.
  • Develops and maintains a set of operational and forward looking security metrics
  • Conducts proof of concepts, vendor comparisons and recommend solutions in line with business requirements
  • Oversees daily monitoring of security reports to identify issues and follow these issues to resolution
  • Oversees security projects and the security testing of new and existing applications.
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management review
Loading...